Methods are provided for securely transmitting a packet between endpoints of a network. In one aspect, there is provided a method for establishing an end-to-end key using extant hop-by-hop security associations. In a second aspect, there is provided a method in which a packet-specific encryption key PEK is used to encrypt a packet p. A signature of the key PEK is independently computed at each of two nodes, using an integrity key shared by the two nodes. The signature is sent from one of the two nodes to the other in association with the packet p. The receiving node uses the signature to verify that the packet p was originated by an entity having possession of the PEK.
|
1. A method comprising:
establishing an end-to-end key for secure transmission of a packet through a network from a first to a second endpoint;
encrypting the packet with the end-to-end key; and
transmitting the packet from the first to the second endpoint;
wherein the establishing the end-to-end key includes transmitting a secret key through the network from the first to the second endpoint under the protection of two or more hop-by-hop security associations, and
wherein the end-to-end key is identical to the transmitted secret key or is separately derivable therefrom at each of said endpoints.
9. A method to be performed at a receiving node of a network, comprising:
receiving a session encryption key from a prior node of the network under protection of a security association with said prior node, wherein the session encryption key is forwarded through an end-to-end path from an originating node at least two hops distant from the receiving node;
receiving from said prior node a forwarded packet having a payload portion that is encrypted with a packet-specific encryption key, wherein the packet is forwarded through the end-to-end path from said originating node; and
locally computing the packet-specific encryption key from inputs which comprise the session encryption key and information specific to the forwarded packet.
14. A method for processing a packet in a network which includes a first node and a second node that share an integrity key, the method comprising:
transmitting the packet from the first node to the second node such that at least a payload portion of the packet is encrypted with a packet-specific encryption key, the packet including the packet-specific encryption key;
computing a signature of the packet-specific encryption key to be used for verifying the packet, wherein said signature computation is carried out using the integrity key; and
transmitting the packet-specific encryption key signature to the second node in association with the packet, wherein the packet and the signature traverse through the network at least two hops from the first node to the second node.
18. A method for processing a packet in a network which includes a first node and a second node that share an integrity key, the method comprising, at the second node:
receiving the packet from the first node such that at least a payload portion of the packet is encrypted with a packet-specific encryption key, the packet including the packet-specific encryption key;
receiving a signature of the packet-specific encryption key from the first node;
computing a signature of the packet-specific encryption key, said computation carried out using the integrity key;
comparing the computed key signature with the received key signature; and
if the computed key signature agrees with the received key signature, accepting the packet as verified, wherein the packet and the signature traverse through the network at least two hops from the first node to the second node.
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
computing a signature of the packet-specific encryption key using an integrity key shared with a node of the network situated intermediate the first and second endpoints;
transmitting the packet from the first to the second endpoint via the intermediate node; and
transmitting the signature to the intermediate node in association with the transmitted packet.
10. The method of
11. The method of
12. The method of
13. The method of
forwarding the packet to the subsequent node; and
transmitting the locally computed packet-specific encryption key signature to the subsequent node in association with the packet, thereby to verify the packet to the subsequent node.
15. The method of
16. The method of
17. The method of
19. The method of
20. The method of
21. The method of
22. The method of
23. The method of
|
This invention relates to security and authentication in wireless systems, and more particularly to wireless systems adapted for sending and receiving packet data.
Modem wireless systems, such as those of the third generation and beyond, are being adapted to send and receive packet data at transfer rates of hundreds, and even of thousands, of kilobits per second. By way of illustration,
The RNC controls a set of base stations that are connected to it. Its function is to manage radio resources. For example, it controls the set-up and tear-down of calls and the processing of voice and data traffic. It also manages hard and soft handoff between cells.
The AuC authenticates each user who tries to log onto the network. More specifically, the AuC authenticates the SIM card located in the entering user's terminal. For each subscriber, a unique secret key is shared between the subscriber and the AuC. The AuC challenges the entering subscriber by sending him a random number which is to be hashed or encrypted with the shared key, and the result returned to the AuC. If the result that has been returned matches the AuC's own result from the same operation, the user will be admitted to the network. The secret information which is shared between the AuC and the user is also used to create a ciphering key CK which provides security when the user and the base station communicate with each other over the air.
It should be noted in this regard that according to other standards, such as certain North American CDMA standards, the cellphone which operates as a user terminal does not include a SIM card. Instead, an electronic serial number (ESN) is inscribed in the cellphone hardware by the manufacturer. In addition, the wireless carrier may identify the cellphone by a mobile identification number (MIN). The ESN and the MIN may be used together for identification, and may be used in procedures for authentication and security. It should further be noted that according to certain standards, including certain North American standards for 3GPP2, functions similar to those of the AuC may be carried out by a network element referred to as the “AAA server”, in which “AAA” stands for “Authentication, Authorization, and Accounting.”
Turning again to
The SGSN (“Serving GPRS Support Node”) tracks the locations of the user terminals within its service area, supports billing and security functions, tunnels downlink packets toward the RNC, and detunnels uplink packets from the RNC. The tunneling and detunneling of packets are in accordance with the GPRS Tunneling Protocol (GTP), which among other things makes it possible for mobile users to maintain connection to the internet while moving from place to place.
The GGSN (“Gateway GPRS Support Node”) functions as an IP router with respect to external packet data networks. As seen in the figure, for example, the GGSN connects to the “IP network.” The GGSN also supports security and billing functions. In accordance with GTP, the GGSN makes the conversion between the ordinary IP packets transported on the external packet networks, and the GTP packets that are tunneled within the UMTS core network. To the external packet network, it appears as though the user, although possibly moving from place to place, is fixed at the GGSN.
It should be noted in this regard that according to other standards, such as certain North American CDMA standards, the RNC is connected to a PDSN instead of an SGSN. The PDSN in turn is connected to a Home Agent (HA). Also, the tunneling protocols used for communication between the PDSN and the RNC and over to the Base Station do not involve GTP. Other systems and standards, such as the IEEE 802.16 based WiMAX system, use a different hierarchy consisting of base stations connected to an Access Gateway (AGW). Overall, the functionality is similar although the details are different.
The base station is typically in an exposed location, and therefore relatively insecure against physical intrusion. On the other hand, the RNC, MSC, SGSN, and GGSN are typically situated in central offices, where sensitive network information can be protected against eavesdropping, tampering, sabotage, and theft.
Thus, the execution of security-related functions is confined to those network elements that are physically secure, whereas the base station acts only to forward encrypted data, without decoding the encrypted messages. Because it is assumed that the physically secure network elements are interconnected by a network that is likewise secure, there are generally no mandatory requirements to additionally set up secure tunnels between those network elements.
Various advanced architectures have been proposed, which may lead to greater exposure, and less physical security, at certain network elements. For example, a flat IP architecture such as the BSR (Base Station Router) architecture integrates most of the functionality of the RNC, SGSN, and GGSN into the base station. (Another version of the BSR architecture relates to the SAE/LTE architecture rather than the UMTS architecture. In this second type of BSR, the eNB, MME, and UPE are integrated into the base station. The preceding abbreviations respectively stand for “enhanced Node B”, “Mobility Management Entity”, and “User Plane Entity.”)
Thus,
In the BSR and similar architectures, encryption and other security-related functions, and even keys and other sensitive information, may reside at physically exposed locations. Moreover, the BSR might make external connections through a public IP network that is vulnerable to eavesdropping and tampering. Because of such increased exposure, there is a need for new safeguards against malicious activity.
However, because physical protection of the backhaul network cannot be guaranteed, it is desirable for such new safeguards to be logically based, at least in part. On the other hand, a new logically based safeguard may face opposition because, e.g., it is incompatible with some wireless standards, or because while conforming to wireless standards it is incompatible with internet standards.
Thus one need, in particular, is for a safeguard against malicious attacks that is effective end-to-end, i.e. between a wireless user terminal and a node of the IP network, or between two wireless user terminals connected via the IP network, and which moreover can be implemented without major changes to existing IP standards.
We have developed such a safeguard. Accordingly, our invention involves transmitting a packet p between two endpoint nodes, designated A and B, in a network of nodes interconnected by links.
According to a first aspect of our new development, an end-to-end key is established using extant hop-by-hop security associations. To send information “end-to-end” in this regard means to send it between any pair of network entities where there is a transition from one type of network or protocol to another, from one subscriber network to another, or from one service provider to another, or where a user terminal is situated, or where there is any other kind of endpoint for a message.
For example, A establishes an end-to-end key Packet Encryption Key (PEK) with B. Information needed to establish the key is securely transferred between A and B by using extant hop-by-hop security associations. The key PEK is packet-specific. The packet p is encrypted with the key PEK and transmitted from A to B.
In specific examples, the key PEK is generated at A and transmitted through the network to B.
In other specific examples, A establishes a session with B. By “session” is meant a mutual agreement for the exchange of data packets between entities having distinct IP addresses for a period of time having a beginning and an end. A and B both obtain at least one session key SEK. For example, A may create a session key SEK and send it to B. Then, A and B each independently create the packet-specific encryption key PEK from at least the session key SEK and from a unique property of the packet p using a known algorithm. The session key is securely sent from A to B using extant hop-by-hop security associations.
At least one hop of the network path from A to B may take place between a pair of nodes that share an integrity key. For example, A may be a wireless user terminal that shares an integrity key with its serving base transceiver node. Similarly, B may also be a wireless user terminal that shares an integrity key with its serving base transceiver node. By “base transceiver node” is meant a base station, node-B, base transceiver station, BSR, or any other element of a wireless network having a similar function.
A second aspect of our new development involves a method in which a packet-specific encryption key PEK is used to encrypt a packet p. A signature of the key PEK is independently computed at each of two nodes, using an integrity key shared by the two nodes. The signature is sent from one of the two nodes to the other in association with the packet p. The receiving node uses the signature to verify the packet p.
In this regard, to “verify” the packet means to verify that the originator of the packet had possession of the PEK. It should be noted that verification of a packet in this sense does not necessarily guarantee that the packet is free of unauthorized modification, as by tampering, for example.
In specific examples, the nodes that share an integrity key are a wireless user terminal and the base transceiver node that serves it.
In specific examples, the packet p is sent from a first wireless user A through a network to a second wireless user B. User A and the base transceiver node that serves it use a signature of the key PEK to verify the authenticity of the packet p, and likewise for User B and the base transceiver node that serves it.
For illustrative purposes, we will describe an example in which our new methods are applied in the context of a UMTS network. However, it should be noted that the methods to be described are more general in application. For example, they may be applied in the context of wireless services that comply with any of a broad range of standards, of which the GSM and UMTS standards are only two examples. Furthermore, they may be applied in contexts in which the access technology is wireline, as well as those in which it is wireless. Still further, our methods are usefully applied in the context of services of various kinds, which may include, for example, conventional wireless services as well as application-level services such as Voice over IP (VoIP). Still further, the security enhancements that our methods may provide may relate to security between access terminals as hardware entities, or they may with equal advantage relate to security between users, i.e., between human beings who are identified as subscribers to a service.
As noted above, the Authentication Center (AuC) in a UMTS network authenticates the SIM card located in the terminal of a subscriber attempting to sign onto the network. The authentication process relies on a secret key that is shared between the subscriber and the AuC. More specifically, a static key referred to as the “root key” is stored within the subscriber's SIM card, and is also stored within the wireless network. In typical UMTS networks, the root key is stored in the AuC, but may be stored in other network elements such as the Home Location Register (HLR). The user terminal and the network each locally generate the ciphering key CK, as well as an integrity key IK, from the root key. It should be noted that various other wireless standards, such as those for GSM, TDMA, and CDMA systems, describe similar procedures for authentication and security.
In an illustrative scenario, as shown in
In the figure, the IP network over which the BSRs communicate with each other is represented by three servers 161, 162, 163. The figure is provided purely for pedagogical purposes, and should not be understood as limiting as to the number of nodes or servers in the IP network or the number of users or BSRs, or in any other sense.
Communications between user terminal 120 and BSR 130 are advantageously protected by encryption. As explained above, in a UMTS system, for example, such communications will typically be protected by encrypting them with the ciphering key CK, and by using a further key IK to assure the integrity of messages exchanged between the user terminal and the BSR. Other node pairs consisting of a wireless user terminal and the BSR that serves it will likewise have their own ciphering key and integrity key. Thus, for example, the link between terminal 120 and BSR 130 is shown in the figure as protected by key 171, which more generally may be a vector of keys. Likewise, the link between terminal 140 and BSR 150 is protected by key 172.
The IP network, or other network, through which BSR 130 and BSR 150 communicate, may also use encryption to protect the messages that are sent through it. There are various IETF standards, for example, that describe the use of encryption for such purposes. For example, the IPSec (Internet Security) architecture described in IETF standards documents includes protocols such as Encapsulating Security Payload (ESP) for encrypting data within the packet payload.
Typically, each hop will be protected by a different ciphering key. Thus, by way of example,
It will generally be advantageous for communication between network nodes, such as user terminals 120 and 140 of
Turning to the procedure described in
A session key SEK is now generated and exchanged between User A and BSR-A, as indicated at block 200. More generally, the session key may be a vector of two or more keys. For example, the vector of keys may include one or more keys for encrypting sessions, and one or more other keys for authenticating packets. For simplicity, we will refer to a single session key SEK, but it should be borne in mind that in fact a vector of two or more keys may be used.
The session key SEK will typically be generated by User A and transmitted to BSR-A under the protection of the ciphering key established between them. However, other arrangements are also possible. For example, BSR-A might generate the key and send it to User A, or a third party might distribute the key to both User A and BSR-A, or User A and BSR-A might each compute the key locally using a pre-arranged algorithm and a shared piece of data. In any event, algorithms for generating session keys are well known, and need not be described here in detail. For example, suitable algorithms are described in the 3GPP and 3GPP2 standards. One specific example is provided by the Enhanced Cryptographic Algorithms (ECA) described in the 3GPP2 standard.
As indicated at blocks 210 and 220 of
Turning to
As indicated at block 240 of
As indicated at block 250, User A sends the signature to BSR-A in association with the corresponding packet. The signature may be attached to the packet, e.g. as part of a header. Alternatively, the signature could be sent as an out-of-band transmission, e.g. in a control channel. As indicated at block 260, BSR-A independently performs a local computation of SIGNATUREIK
As noted above, SIGNATUREIK
The purpose of a signature such as SIGNATUREIK
In the example network described above, the given link may be the link from User A to BSR-A, or as will be seen, the link from BSR-B to User B. Because these links are over the air, they may be particularly vulnerable to attacks in which a spurious packet is injected into a session, or an old packet is reinjected into the session, e.g. after it has been modified. Because PEK is not transmitted, it cannot be intercepted by an attacker. Instead, the attacker would have to compute it, but this is possible only in the unlikely event that the session code is intercepted, together with other information. Thus, interloping packets may be detected and rejected at the receiving end of the link. Accordingly, as indicated at block 270, BSR-A will accept the packet as authentic only if the locally computed value of SIGNATUREIK
Typically, the content of the packet will be inaccessible to all of the intermediate nodes, because it will have been encrypted by User A using the key PEK. That is, even if the key PEK is distributed through the network (either directly or by distributing inputs such as SEK for generating PEK), knowledge of PEK can be denied to the intermediate nodes. For example, a secure IPSec tunnel may be established between BSR-A and BSR-B, or BSR-A and BSR-B may share a Central Security Server. By those or similar means, secure key distribution is readily accomplished. Of course, IPSec tunnels and the like could be used for secure transmission of all the packets of a session. However, such intense use of cryptographic protocols could place an intolerable burden on the computational resources at the intermediate nodes. Such a burden is avoided by, for example, using an IPSec tunnel only once per session, solely for key distribution.
The use of a Central Security Server or IPSec tunnel as described above, is one example of key distribution using extant hop-by-hop security associations. It is noteworthy in this regard that after the key distribution is completed, the Central Security Server need not be involved in routing packets belonging to the pertinent session. Thus, only limited use is made of the Central Security Server.
The sequence of steps illustrated in
As further indicated at block 300, BSR-B independently performs a local computation of SIGNATUREIK
At block 310, BSR-B reencrypts the packet using the ciphering key that it shares with User B, and forwards it to User B. As indicated at block 320, BSR-B also sends SIGNATUREIK
As noted above, the PEK for each packet may be locally computed at the start and end nodes of the first hop and at the start and end nodes of the last hop. A session key is used as input for computing the PEK. The session key is transmitted through the network in encrypted form, using extant hop-by-hop security associations.
In other examples, however, the session key is optional, and the PEK is forwarded through the network using hop-by-hop encryption. For example, User A (as an example of an initiating node) encrypts the packet, or at least the packet payload, with PEK. User A also encrypts PEK, using the ciphering key that it shares with BSR-A (as an example of the end node of the first hop), and signs PEK using the integrity key that it shares with BSR-A. The encrypted PEK and its signature are sent from User A to BSR-A in association with the packet, as described above in reference to the signature SIGNATUREIK
With reference to
The PEK is sent through the network from BSR-A to BSR-B along with the packet, using hop-by-hop encryption. Thus, PEK may be decrypted and reencrypted at each intermediate node, but without decryption of the packet at the intermediate nodes. In typical packets, the payload in field 420 may be 1500 bytes long, whereas the encrypted PEK in field 430 may be only 128 bits long. Thus, it will be clear that decrypting and reencrypting only the PEK saves a great deal of computational resources.
In the example of
At BSR-B, PEK is encrypted using the ciphering key CKB,BSR-B that BSR-B shares with User B, and signed using the integrity key that BSR-B shares with User B. The encrypted PEK is sent from BSR-B to User B in field 430, and the PEK signature is sent from BSR-B to User B in association with the packet.
If the SEK is to be forwarded through the network, the forwarding may be carried out by any of various possible techniques. According to one such technique, the first traffic packet of a new session is sent with at least its payload encrypted with the pertinent PEK. When User A sends the packet to BSR-A, it attaches the SEK, as encrypted by the ciphering key which User A shares with BSR-A. BSR-A decrypts the SEK and distributes it to BSR-B using extant security associations. When BSR-B sends the packet to User B, it attaches the SEK, as encrypted by the ciphering key which User B shares with BSR-B.
According to one of various alternative techniques, the SEK is distributed during call set-up using the pertinent protocols. For example, SEK may be distributed along with SIP (Session Initiation Protocol) messages for setting up a VoIP call or, e.g., a service based on IMS (IP Multimedia Subsystem).
Sundaram, Ganapathy Subramanian, Patel, Sarvar
Patent | Priority | Assignee | Title |
10110595, | Mar 16 2015 | Convida Wireless, LLC | End-to-end authentication at the service layer using public keying mechanisms |
10129031, | Oct 31 2014 | Convida Wireless, LLC | End-to-end service layer authentication |
10154027, | Sep 29 2014 | Extreme Networks, Inc | Private simultaneous authentication of equals |
10601594, | Oct 31 2014 | Convida Wireless, LLC | End-to-end service layer authentication |
10735405, | Sep 29 2014 | Extreme Networks, Inc | Private simultaneous authentication of equals |
10880294, | Mar 16 2015 | Convida Wireless, LLC | End-to-end authentication at the service layer using public keying mechanisms |
10984115, | Dec 04 2018 | Bank of America Corporation | System for triple format preserving encryption |
8897441, | May 26 2009 | Fujitsu Limited | Packet transmitting and receiving apparatus and packet transmitting and receiving method |
9774593, | Sep 29 2014 | Extreme Networks, Inc | Private simultaneous authentication of equals |
9853967, | Sep 29 2014 | Extreme Networks, Inc | Private simultaneous authentication of equals |
Patent | Priority | Assignee | Title |
6185680, | Nov 30 1995 | Kabushiki Kaisha Toshiba | Packet authentication and packet encryption/decryption scheme for security gateway |
6226704, | Dec 01 1998 | Silicon Integrated Systems Corporation | Method and apparatus for performing bus transactions orderly and concurrently in a bus bridge |
7380124, | Mar 28 2002 | Apple Inc | Security transmission protocol for a mobility IP network |
20020025045, | |||
20040103277, | |||
20040236965, | |||
20050177723, | |||
20050232426, | |||
20060078120, | |||
JP2000059356, | |||
JP2000224158, | |||
JP2001086110, | |||
JP2004104559, | |||
JP2005117511, | |||
JP2006033334, | |||
JP8335040, | |||
WO2007012197, | |||
WO33482, | |||
WO2006039967, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
May 26 2006 | Alcatel Lucent | (assignment on the face of the patent) | / | |||
Jul 05 2006 | SUNDARAM, GANAPATHY SUBRAMANIAN | Lucent Technologies Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018154 | /0504 | |
Aug 07 2006 | PATEL, SARVAR | Lucent Technologies Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 018154 | /0504 | |
Nov 01 2008 | Lucent Technologies Inc | Alcatel-Lucent USA Inc | MERGER SEE DOCUMENT FOR DETAILS | 029262 | /0128 | |
Jan 30 2013 | Alcatel Lucent | CREDIT SUISSE AG | SECURITY AGREEMENT | 029821 | /0001 | |
Sep 16 2013 | Alcatel-Lucent USA Inc | Alcatel Lucent | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 031230 | /0841 | |
Aug 19 2014 | CREDIT SUISSE AG | Alcatel Lucent | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 033868 | /0555 |
Date | Maintenance Fee Events |
Oct 09 2013 | ASPN: Payor Number Assigned. |
May 03 2017 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Apr 28 2021 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Nov 12 2016 | 4 years fee payment window open |
May 12 2017 | 6 months grace period start (w surcharge) |
Nov 12 2017 | patent expiry (for year 4) |
Nov 12 2019 | 2 years to revive unintentionally abandoned end. (for year 4) |
Nov 12 2020 | 8 years fee payment window open |
May 12 2021 | 6 months grace period start (w surcharge) |
Nov 12 2021 | patent expiry (for year 8) |
Nov 12 2023 | 2 years to revive unintentionally abandoned end. (for year 8) |
Nov 12 2024 | 12 years fee payment window open |
May 12 2025 | 6 months grace period start (w surcharge) |
Nov 12 2025 | patent expiry (for year 12) |
Nov 12 2027 | 2 years to revive unintentionally abandoned end. (for year 12) |